Lecture 1 - Introduction Flashcards

aaaa (11 cards)

1
Q

What are the 2 steps of the HTTPS protocol?

A
  1. Key exchange: Generation of a shared key using asymmetric cryptography
  2. Secure communication: Secure communication with the help of the shared key using symmetric cryptography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain secure multi-party computation

A

In the center there is a trustworthy party, other parties send their xi (let’s say for example there are 3), the trustworthy party calculates the y=f(x1,x2,x3) and sends it to all parties, this key will be used to encrypt messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the secure multi-party theorem

A

Each trusted party can be realized by a protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the basic idea of an encryption scheme?

A

both actual parties have a secret key (k), sending party encrypts the message using the secret key and transfers the ciphertext, if the ciphertext is taken, without the key it cannot be deciphered, the receiver gets the ciphertext, deciphers it using the secret key k, and reads the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the syntax of a symmetric cipher

A

An encryption scheme is a tuple (Gen, Enc, Dec) where
Gen: Probabilistic key generation algo, which takes as input 1^n and returns key k.
Enc: Encryption algo that takes input k and message m ∈ M and outputs 𝐜 ∈ C. We write c <– Enck(m)
Dec: Decryption algo gets as input the key k and ciphertext c and outputs the message m. Write m = Deck(c)

Spaces:
K - Keyspace
M - Plaintext space
C - Ciphertext space

Correctness: for each k and m holds: Deck(Enck(m)) = m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is kerckhoffs principle?

A

The cipher should remain secure, even if the attacker knows the cipher algo (i.e. attacker knows (Gen, Enc, Dec).

The only thing that is secret is a short key k, which is chosen at random.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why kerchkhoffs principle?

A
  1. In commercially used products, it is difficult to keep the specification secret (reverse engineering).
  2. Short keys are easier to protect, to create and to exchange
  3. The security of the design can be analyzed publicly.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the shift cipher

A

Shifting each letter by k places in the alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can we break substitution ciphers?

A

Substitution ciphers have a fixed mapping for each letter to another letter/symbol, but a statistical approach may be used.

If we know the most used letter in the eng alphabet and we know the message is in english, we can compare and decipher that way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 principles of modern cryptography?

A
  1. Formal definition - security must be precisely defined (sec goals, comparison between schemes, security proofs). Has 2 components (Goals of the adversary, adversary model)
  2. Construction (of a crypto scheme) - Construction of complex crypto scheme from simple crypto primitives, sometimes based on number-theoretical assumptions, design of base primitives should always be left to experts.
  3. Sec Analysis - Proof of security of the construction: carrying out a reduction
  • First try: Test security against all attacks
  • Not possible: There are too many attacks!
  • Second try: Security based on an assumption
  • Reduction proof: The only way to break the cryptoscheme is to break the assumption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly